Hello community, here is the log from the commit of package python3-requests for openSUSE:Factory checked in at 2014-07-17 06:58:16 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/python3-requests (Old) and /work/SRC/openSUSE:Factory/.python3-requests.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python3-requests" Changes: -------- --- /work/SRC/openSUSE:Factory/python3-requests/python3-requests.changes 2013-10-11 19:58:37.000000000 +0200 +++ /work/SRC/openSUSE:Factory/.python3-requests.new/python3-requests.changes 2014-07-17 06:58:22.000000000 +0200 @@ -1,0 +2,72 @@ +Wed Jul 16 11:29:27 UTC 2014 - [email protected] + +- Replace python3-distribute with python3-setuptools requirement +- Use tarball from pypi + +------------------------------------------------------------------- +Thu Jun 12 14:16:21 UTC 2014 - [email protected] + +- Update to version 2.3.0 + + New ``Response`` property ``is_redirect``, which is true when the + library could have processed this response as a redirection (whether + or not it actually did). + + The ``timeout`` parameter now affects requests with both ``stream=True`` + and ``stream=False`` equally. + + The change in v2.0.0 to mandate explicit proxy schemes has been reverted. + Proxy schemes now default to ``http://``. + + The ``CaseInsensitiveDict`` used for HTTP headers now behaves like a normal + dictionary when references as string or viewd in the interpreter. + + No longer expose Authorization or Proxy-Authorization headers on redirect. + Fix CVE-2014-1829 and CVE-2014-1830 respectively. + + Authorization is re-evaluated each redirect. + + On redirect, pass url as native strings. + + Fall-back to autodetected encoding for JSON when Unicode detection fails. + + Headers set to ``None`` on the ``Session`` are now correctly not sent. + + Correctly honor ``decode_unicode`` even if it wasn't used earlier in the + same response. + + Stop advertising ``compress`` as a supported Content-Encoding. + + The ``Response.history`` parameter is now always a list. + + Many, many ``urllib3`` bugfixes.- Fixes incorrect parsing of proxy + credentials that contain a literal or encoded '#' character. + + Assorted urllib3 fixes. + + New exception: ``ContentDecodingError``. Raised instead of ``urllib3`` + ``DecodeError`` exceptions. + + Avoid many many exceptions from the buggy implementation of + ``proxy_bypass`` on OS X in Python 2.6. + + Avoid crashing when attempting to get authentication credentials + from ~/.netrc when running as a user without a home directory. + + Use the correct pool size for pools of connections to proxies. + + Fix iteration of ``CookieJar`` objects. + + Ensure that cookies are persisted over redirect. + + Switch back to using chardet, since it has merged with charade. + + Cookies set on individual Requests through a ``Session`` + (e.g. via ``Session.get()``) are no longer persisted to the ``Session``. + + Clean up connections when we hit problems during chunked upload, + rather than leaking them. + + Return connections to the pool when a chunked upload is successful, + rather than leaking it. + + Match the HTTPbis recommendation for HTTP 301 redirects. + + Prevent hanging when using streaming uploads and Digest Auth when a + 401 is received. + + Values of headers set by Requests are now always the native string type. + + Fix previously broken SNI support. + + Fix accessing HTTP proxies using proxy authentication. + + Unencode HTTP Basic usernames and passwords extracted from URLs. + + Support for IP address ranges for no_proxy environment variable + + Parse headers correctly when users override the default ``Host:`` header. + + Avoid munging the URL in case of case-sensitive servers. + + Looser URL handling for non-HTTP/HTTPS urls. + + Accept unicode methods in Python 2.6 and 2.7. + + More resilient cookie handling. + + Make ``Response`` objects pickleable. + + Actually added MD5-sess to Digest Auth instead of pretending to like + last time. + + Updated internal urllib3. + + Fixed @Lukasa's lack of taste. +- Add no-default-cacert-sles.patch: use this patch when building + for SLES, since python in SLES and openSUSE behave differently + when it comes to SSL, and no-default-cacert.patch is wrong for + SLES. +- Update no-default-cacert.patch + +------------------------------------------------------------------- Old: ---- requests-2.0.0.tar.gz New: ---- no-default-cacert-sles.patch requests-2.3.0.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ python3-requests.spec ++++++ --- /var/tmp/diff_new_pack.KaWFYq/_old 2014-07-17 06:58:24.000000000 +0200 +++ /var/tmp/diff_new_pack.KaWFYq/_new 2014-07-17 06:58:24.000000000 +0200 @@ -1,7 +1,7 @@ # # spec file for package python3-requests # -# Copyright (c) 2013 SUSE LINUX Products GmbH, Nuernberg, Germany. +# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -17,7 +17,7 @@ Name: python3-requests -Version: 2.0.0 +Version: 2.3.0 Release: 0 Url: http://python-requests.org Summary: Awesome Python HTTP Library That's Actually Usable @@ -27,10 +27,11 @@ Source: http://pypi.python.org/packages/source/r/requests/requests-%{version}.tar.gz # PATCH-FIX-OPENSUSE no-default-cacert.patch -- completely ignore the internal CA bundle Patch0: no-default-cacert.patch +Patch1: no-default-cacert-sles.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build BuildRequires: python3 BuildRequires: python3-devel -BuildRequires: python3-distribute +BuildRequires: python3-setuptools BuildArch: noarch %description @@ -61,7 +62,11 @@ %setup -q -n requests-%{version} # For rpmlint warning: remove shebang from python library: sed -i '/^#!/d' ./requests/certs.py +%if %{suse_version} == 1315 +%patch1 -p1 +%else %patch0 -p1 +%endif rm ./requests/cacert.pem %build @@ -72,8 +77,6 @@ %install python3 setup.py install --prefix=%{_prefix} --root=%{buildroot} -# Remove file in blacklisted location -rm -r %{buildroot}%{python3_sitelib}/requests-2.0.0-py%{py3_ver}.egg-info/SOURCES.txt.orig %files %defattr(-,root,root) ++++++ no-default-cacert-sles.patch ++++++ Index: requests-1.1.0/MANIFEST.in =================================================================== --- requests-1.1.0.orig/MANIFEST.in +++ requests-1.1.0/MANIFEST.in @@ -1 +1 @@ -include README.rst LICENSE NOTICE HISTORY.rst test_requests.py requirements.txt requests/cacert.pem +include README.rst LICENSE NOTICE HISTORY.rst test_requests.py requirements.txt Index: requests-1.1.0/requests/adapters.py =================================================================== --- requests-1.1.0.orig/requests/adapters.py +++ requests-1.1.0/requests/adapters.py @@ -132,9 +132,6 @@ class HTTPAdapter(BaseAdapter): if not cert_loc: cert_loc = DEFAULT_CA_BUNDLE_PATH - if not cert_loc: - raise Exception("Could not find a suitable SSL CA certificate bundle.") - conn.cert_reqs = 'CERT_REQUIRED' conn.ca_certs = cert_loc else: Index: requests-1.1.0/requests/certs.py =================================================================== --- requests-1.1.0.orig/requests/certs.py +++ requests-1.1.0/requests/certs.py @@ -18,7 +18,7 @@ def where(): def where(): """Return the preferred certificate bundle.""" # vendored bundle inside Requests - return os.path.join(os.path.dirname(__file__), 'cacert.pem') + return None if __name__ == '__main__': print(where()) ++++++ no-default-cacert.patch ++++++ --- /var/tmp/diff_new_pack.KaWFYq/_old 2014-07-17 06:58:24.000000000 +0200 +++ /var/tmp/diff_new_pack.KaWFYq/_new 2014-07-17 06:58:24.000000000 +0200 @@ -1,8 +1,6 @@ -Index: requests-1.2.3/requests/adapters.py -=================================================================== ---- requests-1.2.3.orig/requests/adapters.py -+++ requests-1.2.3/requests/adapters.py -@@ -129,9 +129,6 @@ class HTTPAdapter(BaseAdapter): +--- a/requests/adapters.py ++++ b/requests/adapters.py +@@ -132,9 +132,6 @@ if not cert_loc: cert_loc = DEFAULT_CA_BUNDLE_PATH @@ -12,11 +10,9 @@ conn.cert_reqs = 'CERT_REQUIRED' conn.ca_certs = cert_loc else: -Index: requests-1.2.3/requests/certs.py -=================================================================== ---- requests-1.2.3.orig/requests/certs.py -+++ requests-1.2.3/requests/certs.py -@@ -18,7 +18,7 @@ import os.path +--- a/requests/certs.py ++++ b/requests/certs.py +@@ -18,7 +18,7 @@ def where(): """Return the preferred certificate bundle.""" # vendored bundle inside Requests @@ -25,29 +21,8 @@ if __name__ == '__main__': print(where()) -Index: requests-1.2.3/MANIFEST.in -=================================================================== ---- requests-1.2.3.orig/MANIFEST.in -+++ requests-1.2.3/MANIFEST.in +--- a/MANIFEST.in ++++ b/MANIFEST.in @@ -1 +1 @@ -include README.rst LICENSE NOTICE HISTORY.rst test_requests.py requirements.txt requests/cacert.pem +include README.rst LICENSE NOTICE HISTORY.rst test_requests.py requirements.txt -Index: requests-1.2.3/requests.egg-info/SOURCES.txt -=================================================================== ---- requests-1.2.3.orig/requests.egg-info/SOURCES.txt -+++ requests-1.2.3/requests.egg-info/SOURCES.txt -@@ -10,7 +10,6 @@ requests/__init__.py - requests/adapters.py - requests/api.py - requests/auth.py --requests/cacert.pem - requests/certs.py - requests/compat.py - requests/cookies.py -@@ -79,4 +78,4 @@ requests/packages/urllib3/contrib/pyopen - requests/packages/urllib3/packages/__init__.py - requests/packages/urllib3/packages/ordered_dict.py - requests/packages/urllib3/packages/six.py --requests/packages/urllib3/packages/ssl_match_hostname/__init__.py -\ No newline at end of file -+requests/packages/urllib3/packages/ssl_match_hostname/__init__.py ++++++ requests-2.0.0.tar.gz -> requests-2.3.0.tar.gz ++++++ ++++ 30248 lines of diff (skipped) -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
